Risk
5/1/2013
08:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Support.com Offers SUPERAntiSpyware For Business

SAS for Business includes a central management console for deploying and managing SUPERAntiSpyware client software

Redwood City, CA – April 30, 2013 – Support.com (NASDAQ: SPRT), a leading provider of cloud-based technology services and software, today announced the release of SUPERAntiSpyware® (SAS) for Business. SAS for Business includes a central management console for efficiently deploying and managing SUPERAntiSpyware client software on desktops in business environments.

"SUPERAntiSpyware for Business has made it possible for Portage Community Bank of Ravenna, Ohio to take full advantage of the outstanding spyware and malware protection provided by SUPERAntiSpyware," said Charles Bevan, IT Specialist at Portage Community Bank. "With the central management console, we're able to quickly deploy SUPERAntiSpyware to our employee desktops and provide our IT staff with the tools they need to manage our desktops efficiently."

The central management console included in SAS for Business provides a number of benefits for businesses:

Enables IT administrators to control scan schedules and configuration policies corporate-wide and for individual desktops.

Delivers automated alerts when specific threats and malware are detected and includes customizable settings for email notifications and desktop health reports.

Supports automated responses to specific threats to help protect organizations from repeated attacks and chronic end point re-infection.

Automates SAS client updates, helping IT manage costs by reducing the time spent on software updates and drive compliance with security policies by keeping end points up-to-date.

"Mitigating the risk and downtime of cyber-attacks is increasingly important for businesses," said Support.com CEO Josh Pickus. "SUPERAntiSpyware for Business enables businesses to efficiently deploy and manage one of the best reviewed and most effective anti-malware / anti-spyware products on the market. SUPERAntiSpyware for Business is part of a comprehensive suite of offerings for small businesses from Support.com, including workstation setup and support, proactive server and network monitoring and management, business-class backup and recovery and cloud-based services."

SAS for Business is available directly from http://www.superantispyware.com/ or via Support.com channel partners, which include communication providers, retailers, technology companies and others.

About Support.com

Support.com, Inc. (NASDAQ: SPRT) is a leading provider of cloud-based technology services and software. We help leading brands create new revenue streams and deepen customer loyalty through programs that enhance their customers' technology experience. Our solution includes a comprehensive Service Delivery Platform, mobile and desktop apps, a scalable workforce of technology specialists and proven expertise in program design and execution. Our partners include many of the nation's leading communications providers, retailers and technology companies. For more information, please visit us at: www.support.com.

Comment  | 
Print  | 
More Insights
White Papers
More White Papers
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: " I think Google Doodle is getting a little out of control"
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.